RSA Blog - March 2017

3/31/2017 - Protecting Identities in a hacker's worldImagine being in a place where everyone around you is smarter than you and are, in fact, admitted hackers. Welcome to protecting the identities behind Black Hat Asia 2017’s infrastructure. With a large contingency of attendees at this year’s conference there is a constant need to protect the identities of the team maintaining and monitoring...

3/30/2017 - Six Keys to a Successful Identity Assurance Strategy: Business ContextTraditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. Today’s enterprise needs more to effectively protect critical applications when delivering access in a world without boundaries. By applying a risk-based approach to our authentication strategy with identity assurance, we can go beyond simple authentication approaches. We can deliver...

3/27/2017 - Testing a Threat Pattern: Quality is Never an AccidentJohn Ruskin, one of the great visionaries of the 19th century, said “Quality is never an accident; it is always the result of intelligent effort”, in our continuing journey through the lifecycle of a threat pattern, we are now at the testing phase. After analyzing requirements, asset and threats, designing a general and reusable model for the threat pattern and implementing the...

3/23/2017 - The GDPR and your data protection obligationsThe focus is growing for the European Union’s forthcoming “General Data Protection Regulation,” or GDPR. As its May 25, 2018 implementation date draws nearer, organizations are starting to understand the magnitude of change this major regulation will drive. It is not only EU-based organizations that are subject to the GDPR’s requirements. If your company stores...

3/21/2017 - Answering the #1 Question in Identity ManagementTakeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in...

3/14/2017 - Fraud Management Metrics that Drive InvestmentIf your role is responsible for a budget, your work ultimately revolves around one word: metrics. It is a word we often dread, because we can never seem to get it right. I live and breathe metrics in marketing, and if you are the gal or guy responsible for the fraud management or cyber security...

3/8/2017 - Multi-Factor Authentication You Can Count OnMore than 25,000 organizations worldwide trust RSA SecurID® Access to provide a convenient, secure multi-factor authentication experience for their users. And now RSA SecurID Access is honored to have won the SC Magazine 2017 Trust Award for best multi-factor authentication solution – three years in a row. RSA SecurID Access multi-factor identity solution had to...

3/2/2017 - RSA and the Power of CommUNITYAfter attending RSA Conference 2017 it was clear the theme – The Power of CommUNITY – was a thread throughout the conference. This was seen in several places: Dr. Zulfikar Ramzan, CTO of RSA, mentioned this topic several times in his keynote on Tuesday morning. He urged us as an industry to “draw connections” and...

3/1/2017 - Facing a Tsunami of Issues?“Tsunami” is the Japanese term for a series of violent and recurrent waves in the ocean caused by the displacement of a large volume of water. Earthquakes, volcanic eruptions, landslides or other underwater explosions or man-made events are usually the cause. Unlike normal ocean waves that are generated by wind, or tides that are generated...

3/1/2017 - What do RSA Conference 2017 and my DVR have in common?Another year, another RSA Conference. At this point, I have lost count of my appearances at this annual gathering of all things security – I believe it was number 15 or 16 for me. I say “appearances” because the days blur into such a steady stream of meetings, discussions and general sensory overload that at...